Ransomware Gang Claims to Have Hacked Amazon Ring
There has been a recent cyber attack on Amazon’s popular security camera company, Ring, which was attributed to a ransomware group ALPHV that uses...
Malware Campaigns Abusing Telegram Bots to Spread Rapidly
Numerous updates and alterations were witnessed in the major malware families employed in phishing scams during the first quarter of 2023, alongside significant variations...
Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
Jun 02, 2023Ravie LakshmananMalware / Cyber Threat
The Chinese nation-stage group known as Camaro Dragon has been linked to yet another backdoor that's designed...
Cisco and VMware Release Security Updates to Patch Critical Flaws in their Products
Apr 21, 2023Ravie LakshmananSoftware Update / Network Security
Cisco and VMware have released security updates to address critical security flaws in their products that...
SaaS Security Posture Management (SSPM) as a Layer in Your Identity Fabric
Jan 23, 2023The Hacker NewsSaaS Security / SSPM Solution
The move to SaaS and other cloud tools has put an emphasis on Identity &...
Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability
Dec 13, 2022Ravie LakshmananVirtual Private Network / Network Security
Fortinet on Monday issued emergency patches for a severe security flaw affecting its FortiOS SSL-VPN...
Amazon Banned Flipper Zero Pentesting Tool
According to reports, Amazon has stopped selling Flipper Zero, one of the most widely used pentesting tools. Amazon tagged the product as a “card-skimming...
Serious Unpatched Vulnerability Uncovered in Popular Belkin Wemo Smart Plugs
May 17, 2023Ravie LakshmananInternet of Things / Vulnerability
The second generation version of Belkin's Wemo Mini Smart Plug has been found to contain a...
AuKill Malware Kills EDR Clients To Attack Windows Systems
A new hacking tool, AuKill, disables Endpoint Detection & Response (EDR) software for threat actors to launch BYOD attacks by deploying backdoors and ransomware...
Hackers Abuse Legitimate Remote Monitoring Tools
A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC)...